Internal training

DORA: Fundamentals, Risk Management, and Organizational Readiness

Training based on the practical aspects and responsibilities arising from the DORA (Digital Operational Resilience Act) Regulation.

About the training

Training on the Requirements of the DORA Regulation

We invite you to a one-day training dedicated to the DORA Regulation, which focuses on the key aspects of this regulation. Participants will gain in-depth knowledge about the requirements of the Regulation, including risk management related to external suppliers and Information and Communication Technologies (ICT). The combination of theoretical sessions and practical workshops will allow participants to master the most important elements of DORA, such as its objectives, principles, and requirements, which are crucial in the context of collaboration with various suppliers and service providers.

The detailed scope of the training is presented below.

Dedicated exclusively to your organization – this approach guarantees comfort and freedom to thoroughly discuss sample issues and the situation in your organization. We know that every company is different; to effectively translate the acquired knowledge into your organization’s context, we tailor the presented examples to your specific needs and business situation.

Training program

Day 1

9.00-16.00

  • Training Program
  • Welcome Participants
  • Introduction to the DORA Act – Key Concepts and Topics
  • Discussion of DORA regulation to enhance and organize participants’ understanding of the directive and related obligations.
  • ICT Risk Management
  • Topics covered:
  • ICT Risk Identification
  • ICT Risk Assessment
  • ICT Risk Management
  • Monitoring and Controlling the IT Environment
  • Emergency Actions and Recovery
  • Break
  • ICT Incident Management
  • Topics covered:
  • ICT Incident Management Planning
  • ICT Incident Identification
  • ICT Incident Classification
  • ICT Incident Response Methods
  • Internal Communication and Coordination
  • Incident Analysis: Corrective Actions and Adjustments
  • Break
  • Third-Party Risk Management
  • Topics covered:
  • Identifying Risks Related to Vendors
  • Vendor Risk Assessment
  • Vendor Selection Based on Risk Analysis Results
  • Vendor Monitoring and Evaluation
  • Summary
  • Time allocated for additional participant questions on topics not covered during the training.

How does it work?

Step 1

REGISTRATION

In the first step, fill out the registration form to inform us of your interest in organizing a dedicated training at your company.

Step 2

DATE

We will set the date and location of the training – adapting to your availability and individual expectations.

Step 3

PRICE

We will present you with the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will conduct the dedicated training in accordance with the agreed terms.

Request a quote for an internal training

Organizers